Why MFA Stops Most Attacks

An MFA lesson framed as scenario, attack chain, observable evidence, operator response, and WitnessOps controls.

A stolen password without MFA gives instant access. A stolen password with MFA often gives nothing.

Scenario

An attacker gets a valid password from phishing, password reuse, or a public breach. They try it against email, cloud, or finance systems.

Attack Chain

Without MFA

Password stolen
  ↓
Attacker signs in
  ↓
Account compromised

With MFA

Password stolen
  ↓
Attacker tries to sign in
  ↓
MFA prompt or challenge appears
  ↓
User denies or does not possess the factor
  ↓
Access blocked

Observable Evidence

Look for:

  • repeated sign-in attempts that fail on the MFA step
  • MFA prompts the user did not initiate
  • weak MFA methods such as SMS on sensitive accounts
  • privileged accounts with no MFA at all
  • successful logins from exposed accounts that should have been challenged

Operator Response

  1. Enable MFA first on email, cloud admin, and finance systems.
  2. Prefer phishing-resistant methods for privileged or high-value accounts.
  3. Treat unsolicited MFA prompts as evidence of attempted compromise.
  4. Reset the password and revoke sessions if a prompt was accidentally approved.

WitnessOps Controls

The governed path should include:

Which MFA to use

MethodStrengthNotes
Hardware keyStrongestPhishing-resistant. Best for privileged access.
Authenticator appStrongGood default for most users.
Push notificationGoodWatch for fatigue and accidental approval.
SMS codeBetter than nothingWeakest option. Use only if nothing better is available.

Priority order:

  1. Email — your email is the master key to every other account
  2. Cloud services — Microsoft 365, Google Workspace, AWS
  3. Financial accounts — banking, payroll
  4. Social media — used for impersonation and resets
  5. Everything else